Downloadable Contentopen in viewer
This report studies a number of quantum cloning machines, motivated by their relevance to the field of quantum cryptography. Following a review of basic notions, the report looks at the Buzek-Hillery cloning machine and its generalizations using an approach due to Werner. With this background, an attack on the BB84 protocol by a particular type of cloning machine is considered and a security criterion for the protocol under such an attack is derived.
- This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
- Date created
- Resource type
- Rights statement
- In Collection:
Permanent link to this page: https://digital.wpi.edu/show/n009w5550